Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing

被引:11
作者
Xiao, Huizi [1 ,2 ]
Zhao, Jun [3 ]
Feng, Jie [1 ,4 ]
Liu, Lei [5 ]
Pei, Qingqi [1 ,2 ]
Shi, Weisong [6 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, State Key Lab ISN, Xian 710071, Shaanxi, Peoples R China
[2] Univ Shaanxi Prov, Engn Res Ctr Trusted Digital Econ, Xian 710049, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[4] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Shaanxi, Peoples R China
[5] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[6] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Computation offloading; resource allocation; secure information capacity; vehicular edge computing; MODEL;
D O I
10.1109/TWC.2023.3265458
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular Edge Computing (VEC) is a promising new paradigm that has attracted much attention in recent years, which can enhance the storage and computing capabilities of vehicular networks to provide users with low latency and high-quality services. Due to the open access and unreliable wireless channels, some appropriate security measures should be implemented in the VEC to ensure information security. However, the operation of the security mechanism dominates supererogatory computing resources, thus affecting the performance of VEC systems. The scarcity of computation and energy resources of the vehicles conflicts with the requirement of tasks for time delay and information security. In this paper, taking the driving velocity and position of the vehicles, the number of lanes, the model and density of the attackers, and security strength into consideration, we formulate a max-min optimization problem to jointly optimize offloading decision, transmit power, task computation frequency, encryption computation frequency, edge computation frequency, and block length to obtain optimal secure information capacity and local computation delay. The formulated optimization problem is a mixed integer nonlinear programming (MINLP), which is intractable. We apply the generalized benders decomposition (GBD)-based method to solve it. The simulation results show that our proposed algorithms have convergence and effectiveness and achieve fairness among vehicles on the road.
引用
收藏
页码:8751 / 8765
页数:15
相关论文
共 33 条
[1]  
Abuelenin SM, 2014, INT CONF CONNECT VEH, P391, DOI 10.1109/ICCVE.2014.7297577
[2]  
AlNagar Y, 2019, IEEE WIREL COMMUNN, DOI [10.1109/wcncw.2019.8902590, 10.1109/wcncw.2019.8902903]
[3]   Processor design for portable systems [J].
Burd, TD ;
Brodersen, RW .
JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 1996, 13 (2-3) :203-221
[4]  
Cao Y, 2017, 2017 IEEE VISUAL COMMUNICATIONS AND IMAGE PROCESSING (VCIP)
[5]  
Choo S, 2018, I C INF COMM TECH CO, P251, DOI 10.1109/ICTC.2018.8539726
[6]   Min-Max Cost Optimization for Efficient Hierarchical Federated Learning in Wireless Edge Networks [J].
Feng, Jie ;
Liu, Lei ;
Pei, Qingqi ;
Li, Keqin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (11) :2687-2700
[7]   Heterogeneous Computation and Resource Allocation for Wireless Powered Federated Edge Learning Systems [J].
Feng, Jie ;
Zhang, Wenjing ;
Pei, Qingqi ;
Wu, Jinsong ;
Lin, Xiaodong .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (05) :3220-3233
[8]   AVE: Autonomous Vehicular Edge Computing Framework with ACO-Based Scheduling [J].
Feng, Jingyun ;
Liu, Zhi ;
Wu, Celimuge ;
Ji, Yusheng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (12) :10660-10675
[9]   Autonomous Driving Security: State of the Art and Challenges [J].
Gao, Cong ;
Wang, Geng ;
Shi, Weisong ;
Wang, Zhongmin ;
Chen, Yanping .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) :7572-7595
[10]   CORRELATION MODEL FOR SHADOW FADING IN MOBILE RADIO SYSTEMS [J].
GUDMUNDSON, M .
ELECTRONICS LETTERS, 1991, 27 (23) :2145-2146